Information disclosure in Cisco ASA 5500-X Series - CVE-2017-6752

 

Information disclosure in Cisco ASA 5500-X Series - CVE-2017-6752

Published: August 3, 2017 / Updated: July 20, 2018


Vulnerability identifier: #VU7675
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6752
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco ASA 5500-X Series

Detailed vulnerability description

The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists in the web interface of the Cisco Adaptive Security Appliance (ASA) due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. A remote attacker can perform a username enumeration attack to the IP address of the device, determine valid usernames and conduct additional reconnaissance attacks.

Successful exploitation of the vulnerability results in information disclosure.

How to mitigate CVE-2017-6752

The vulnerability is addressed in the following versions: 10.0.13(0.161), 10.0.11(0.76), 10.0.8(40.131), 9.9.1(20.20), 9.9.1(10.4), 9.8.1(12.54), 9.8.1(1.114), 9.8.1(0.8), 9.7.1(0.153), 9.6.2(0.132), 9.8(0.99), 9.7(1.5), 9.6(3.2), 9.4(4.6), 9.2(4.21), 9.1(7.17).

Sources